Reference no: EM13947433
I have answered the questions; however, I am uncertain if I am on the right track. Can you please let me know with some explanation if your answers are different?
1. Which best describes how malicious code can get on your computer?
a. Email attachments
b. Downloaded software from non-authoritative sources and websites
c. Sharing diskettes from computers without up to date antivirus software
d. All of the above
e. A and C only
My guess is "all of the above".
2. A way of verifying a message's integrity after transport across a network is through the use of:
a. A Message Authentication Code
b. Steganography
c. An encryption key
d. A cipher
My Guess is an encryption key as this appears to be the safest way to transmit a message.
3. Which of the following best describes examples of mobile code?
a. Java, Javascript, and ActiveX
b. HTML, the language of web pages
c. Postscript, the language of some LaserJet printers
d. All of the above
e. None of the above
My guess is (A) as HTML is for web pages and (C) I have no idea what it is used for.
4. Which statement best describes the advantages of public key encryption?
a. Keys are exchanged publicly without an eavesdropper being able to decrypt messages
b. Knowledge of one's public key does not yield knowledge of their private key
c. Encryption performance is faster than secret-key encryption
d. A and B only
e. None of the above
My guess is (A) is this correct..for some reason it doesn't look right.
5. Which statement best captures the advantage of secret key encryption?
a. It allows for faster encryption speeds than public key encryption
b. It only requires one key to be distributed for encryption and decryption
c. The keys are stronger than public keys and are more difficult to break
d. All of the above
e. A and B only.
My guess is (a).
6. Which of the following best describes what is removed from a hard drive when a file is deleted from the hard drive?
a. The MBR record, the FAT record, and the Directory Table entry.
b. The FAT record, the Directory Table entry, and the data clusters that the file occupied.
c. The FAT record and the Directory Table entry.
d. The FAT record, the Directory Table Entry, and the Partition Table.
My guess is (b).
Determine which will be the independent variable
: Choose 1 independent and 1 dependent variable from the following: variables - education level, smoking status, exercise, gender, marital status, age, weight, serum cholesterol, systolic blood pressure, sodium intake, IQ. WRITE A 100 - 200 word sta..
|
Certain about the direction of price change
: You are positive that the XYZ stock price will change a lot in the near future. But you are not certain about the direction of price change. Which strategy is the best to use in this scenario?
|
Forward hedge or a money market hedge
: Alpha Company, U.S.-based manufacturer of industrial equipment, just purchased a Korean company that produces plastic nuts and bolts for heavy equipment. Alpha's weighted average cost of capital is 10%. Given this information, determine whether a for..
|
New issue of preferred stock it calls
: E-Eyes.com has a new issue of preferred stock it calls 20/20 preferred. The stock will pay a $20 dividend per year, but the first dividend will not be paid until 20 years from today. If you require a 9.25 percent return on this stock, how much should..
|
Describes how malicious code can get on your company
: Which statement best describes the advantages of public key encryption?
|
Evidence plays a critical role in auditing
: Evidence plays a critical role in auditing. Without quality evidence, auditors cannot arrive at the right conclusions about audit objectives. Evidence can be considered strong if it is persuasive. Persuasiveness, in turn, can be achieved if the ev..
|
What growth rate is expected for the company stock price
: The stock price of Jenkins Co. is $53.90. Investors require a 13 percent rate of return on similar stocks. If the company plans to pay a dividend of $3.60 next year, what growth rate is expected for the company’s stock price?
|
Uniform heat generation within the shells
: If there is uniform heat generation within the shells, obtain expressions for the steady-state, one-dimensional radial distributions of the temperature, heat flux, and heat rate. Contrast your results with those summarized in Appendix C.
|
Create a probability distribution for the number of bedrooms
: Use the normal distribution to estimate the number of homes 18 or more miles but less than 22 miles from the center of the city. Compare this to the actual results. Does the normal distribution yield a good approximation of the actual results?
|